Hacking

How many mobile Users could be affected by Heartbleed flaw?

Heartbleed is the security flaw that is scaring IT industry, which is its impact on the mobile worlds? How many…

12 years ago

Raoul Chiesa – from cybercrime to state-sponsored hacking

Raoul Chiesa gives us his view on the current cyber threat landscape, from Snowden's case to the links between cyber crime and…

12 years ago

Hacking Google server using a malicious XML is possible

A Team of researchers discovered a critical XML External Entity (XXE) vulnerability on Google server that allows an attacker to…

12 years ago

BlackBerry and CISCO products are affected by Heartbleed vulnerability

CISCO and BlackBerry started to evaluate the impact of Heartbleed vulnerability on their products ... unfortunately,the list of affected solutions…

12 years ago

Reading the Mandiant M-Trends 2014 Threat Report

Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed…

12 years ago

New Google Chrome bug allows eavesdropping on conversation

Security Blogger Guya discovered a new Google Chrome eavesdropping bug that allows websites to listen to user private conversations. A…

12 years ago

The Extortion is a common practice in the cyber criminal ecosystem

According principal security firms, extortion, ransom and blackmail are pillars of illicit activities, cyber criminals are adapting them to the…

12 years ago

Symantec Internet Security Threat Report on evolution of cyber menaces

Symantec has issued The Internet Security Threat Report, a document which provides an overview and analysis of global threat evolution…

12 years ago

Heartbleed Bug is a serious flaw in the OpenSSL cryptographic library

The Heartbleed Bug is a serious flaw in the popular OpenSSL library that allows an attacker to reveal up to…

12 years ago

Symantec on a fake voting campaign used to steal Facebook credentials

Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim's credentials.…

12 years ago

This website uses cookies.